[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252416

 
 

909

 
 

196839

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26350 Download | Alert*

The host is installed with Cisco AnyConnect Secure Mobility Client before 4.9.06037 is prone to a windows upgrade DLL hijacking vulnerability. A flaw is present in the application which fails to handle a temporary file with insecure permissions that is created during the upgrade process. Successful exploitation could allows attackers to execute arbitrary code on the affected device with SYSTEM pri ...

The host is installed with Cisco AnyConnect Secure Mobility Client before 4.10.00093 is prone to a windows upgrade executable hijacking vulnerability. A flaw is present in the application which fails to handle a temporary file with insecure permissions that is created during the upgrade process. Successful exploitation could allows attackers to execute arbitrary code on an affected device with SYS ...

The host is installed with Cisco AnyConnect Secure Mobility Client before 4.9.03022 is prone to a windows install executable hijacking vulnerability. A flaw is present in the application which fails to loads an executable file from a user-writable directory. Successful exploitation could allows attackers to execute arbitrary code on the affected device with SYSTEM privileges.

The host is installed with Cisco AnyConnect Secure Mobility Client before 4.10.00093 is prone to an improper input validation vulnerability. A flaw is present in the application which fails to handle a crafted IPC message sent to the AnyConnect process. Successful exploitation could allows attackers to overwrite VPN profiles on an affected device.

The host is installed with PostgreSQL 9.6.x before 9.6.22, 10.x before 10.17, 11.x before 11.12, 12.x before 12.7 or 13.x before 13.3 and is prone to an integer overflow vulnerability. A flaw is present in the application which fails to handle bounds checks issue while modifying certain SQL array values. Successful exploitation allows attackers to make the authenticated database users write arbitr ...

The host is installed with Apache HTTP Server 2.4.6 through 2.4.46 and is prone to a HTTP request smuggling vulnerability. A flaw is present in the application, which fails to properly handle an issue in mod_proxy_wstunnel. Successful exploitation could allow attackers to cause subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possi ...

The host is installed with Apache HTTP Server 2.4.0 through 2.4.46 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle insufficient privileges. Successful exploitation could allow unprivileged attackers to stop httpd.

The host is installed with Apache HTTP Server 2.4.41 through 2.4.46 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle specially crafted requests using both Content-Length and Transfer-Encoding headers. Successful exploitation could allow unprivileged attackers to cause mod_proxy_http to crash, leading to a denial of servi ...

Apache HTTP Server 2.4.39 to 2.4.46: Unexpected URL matching with MergeSlashes OFF.

The host is installed with Apache HTTP Server 2.4.6 through 2.4.46 and is prone to a NULL pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle an issue in the HTTP/2 protocol handler. Successful exploitation could allow attackers to cause denial of service on the server.


Pages:      Start    1600    1601    1602    1603    1604    1605    1606    1607    1608    1609    1610    1611    1612    1613    ..   2634

© SecPod Technologies